Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Supervised learning-based DDoS attacks detection: Tuning hyperparameters

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Meejoung-
dc.date.accessioned2021-09-01T04:52:44Z-
dc.date.available2021-09-01T04:52:44Z-
dc.date.created2021-06-19-
dc.date.issued2019-10-
dc.identifier.issn1225-6463-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/62628-
dc.description.abstractTwo supervised learning algorithms, a basic neural network and a long short-term memory recurrent neural network, are applied to traffic including DDoS attacks. The joint effects of preprocessing methods and hyperparameters for machine learning on performance are investigated. Values representing attack characteristics are extracted from datasets and preprocessed by two methods. Binary classification and two optimizers are used. Some hyperparameters are obtained exhaustively for fast and accurate detection, while others are fixed with constants to account for performance and data characteristics. An experiment is performed via TensorFlow on three traffic datasets. Three scenarios are considered to investigate the effects of learning former traffic on sequential traffic analysis and the effects of learning one dataset on application to another dataset, and determine whether the algorithms can be used for recent attack traffic. Experimental results show that the used preprocessing methods, neural network architectures and hyperparameters, and the optimizers are appropriate for DDoS attack detection. The obtained results provide a criterion for the detection accuracy of attacks.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-
dc.subjectSERVICE ATTACKS-
dc.titleSupervised learning-based DDoS attacks detection: Tuning hyperparameters-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Meejoung-
dc.identifier.doi10.4218/etrij.2019-0156-
dc.identifier.wosid000487989800001-
dc.identifier.bibliographicCitationETRI JOURNAL, v.41, no.5, pp.560 - 573-
dc.relation.isPartOfETRI JOURNAL-
dc.citation.titleETRI JOURNAL-
dc.citation.volume41-
dc.citation.number5-
dc.citation.startPage560-
dc.citation.endPage573-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART002514524-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusSERVICE ATTACKS-
dc.subject.keywordAuthoraccuracy of detection-
dc.subject.keywordAuthorDDoS attack-
dc.subject.keywordAuthorlong short-term memory-
dc.subject.keywordAuthormachine learning-
dc.subject.keywordAuthortensorflow-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE